Karim O. Elish Assistant Professor Department of Computer Science Indiana University-Purdue University Fort Wayne, IN 46805 kelish@purdue.edu http://people.cs.vt.edu/~kelish/ RESEARCH INTERESTS Software security, malware analysis and detection, smartphone security and privacy, using program analysis and machine learning for security and privacy Software refactoring, software quality predictive models, empirical software engineering EDUCATION Ph.D. in Computer Science July 2015 Virginia Tech, Blacksburg, VA Dissertation title: User-Intention Based Program Analysis for Android Security Advisor: Dr. Danfeng Yao Committee: Dr. Barbara Ryder, Dr. Xuxian Jiang, Dr. Wenjing Lou, and Dr. Eli Tilevich M.S. in Computer Science 2009-2011 Virginia Tech, Blacksburg, VA M.S. in Computer Science 2006-2008 King Fahd University of Petroleum and Minerals (KFUPM), Dhahran, Saudi Arabia Emphasis on Software Engineering Thesis title: Classification of Refactoring Methods Based on Software Quality Attributes Advisor: Dr. Mohammad Alshayeb B.S. in Computer Science 2001-200 King Fahd University of Petroleum and Minerals (KFUPM), Dhahran, Saudi Arabia Second Honors WORK EXPERIENCE Assistant Professor Department of Computer Science, Indiana University-Purdue University, Fort Wayne Graduate Research/Teaching Assistant Jan. 2010 - July 2015 Department of Computer Science, Virginia Tech Lecturer June 2008 - Aug. 2009 Member, Consultant Team June 2008 - Feb. 2009 Ministry of Education, Kingdom of Saudi Arabia Graduate Research/Teaching Assistant Sep. 2006 - June 2008 Software Engineer Jan. 2006 - June 2006 Capstone Project for Saudi ARAMCO Summer Intern Summer 2005 Samba Financial Group (Saudi American Bank) 1
TEACHING Department of Computer Science, Indiana University-Purdue University CS 160 Introduction to Computer Science I Fall 2015 CS 360 Software Engineering Fall 2015 Computer Science Department, Virginia Tech CS 4264 Principles of Computer Security Fall 2014 CS 3114 Data Structures and Algorithms Spring 2013, 2012 CS 4704 Software Engineering Spring 2010 ICS 102 Introduction to Computing (Java Programming) Spring 2009, Fall 2008 PYP 002 Preparatory Computer Science Spring 2009, Fall 2008 SWE 214 - Introduction to Software and Requirements Engineering Spring 2008, Fall 2007 ICS 350/351/352 - Cooperative Work Spring 2007, Fall 2006 HONORS AND AWARDS Phi Beta Delta Honor Society for International Scholars April 2014 For scholarly achievement, received a bronze Phi Beta Delta Medallion Best Poster Award, Annual Graduate Student Poster Showcase April 2014 Department of Computer Science, Virginia Tech Top 5 Finalist March 2014 For Paul E. Torgersen Research Excellence Award among College of Engineering, Virginia Tech 1 st Place Award, 28 th Annual Graduate Research Symposium, Virginia Tech March 2012 Travel Grant Award, IEEE Symposium on Security & Privacy May 2012 Upsilon Pi Epsilon (UPE) Honor Society for the Computing and Information Disciplines April 2011 Outstanding academic achievement, Virginia Tech Chapter Outstanding Graduate Academic Performance Award 2007-2008 College of Computer Science and Engineering, KFUPM Saudi ARAMCO Certificate of Recognition March 2007 For designing and developing a web-based Project Quality Index system IEEE Outstanding Project Accomplishment June 2006 For the integrity and creativity in Automating Project Quality Index System for Saudi ARAMCO. It has been implemented successfully in the field with cooperation between industry and academia. KFUPM Distinguished Senior Project June 2006 For designing and developing a web-based PQI system for Saudi ARAMCO. 2
PUBLICATIONS REFEREED JOURNAL ARTICLES J1. Karim Elish, Xiaokui Shu, Danfeng Yao, Barbara Ryder, and Xuxian Jiang, Profiling User-Trigger Dependence for Android Malware Detection, Computers & Security, Elsevier, vol. 49, 255-273, March 2015. J2. Karim Elish and Mohammed Alshayeb, Using Software Quality Attributes to Classify Refactoring to Patterns, Journal of Software, Academy Publisher, vol. 7, no. 2, Feb. 2012. J3. Karim Elish and Mohammed Alshayeb, A Classification of Refactoring Methods Based on Software Quality Attributes, Arabian Journal for Science and Engineering, Springer, vol. 36, no. 7, Nov. 2011. J4. Karim Elish and Mahmoud Elish, Predicting Defect-Prone Software Modules Using Support Vector Machines, Journal of Systems and Software (JSS), Elsevier, vol. 81, no. 5, May 2008. [In top 10 most cited papers among all the papers published by JSS in 2008, 203 citations] REFEREED CONFERENCE / WORKSHOP PUBLICATIONS C1. Karim Elish, Danfeng Yao, and Barbara Ryder, On the Need of Precise Inter-App ICC Classification for Detecting Android Malware Collusions. In proceedings of the IEEE Mobile Security Technologies Workshop (MoST), in conjunction with the IEEE Symposium on Security and Privacy, San Jose, CA. May 2015. C2. Britton Wolfe, Karim Elish, and Danfeng Yao, High Precision Screening for Android Malware using Dimensionality Reduction. In proceedings of the 13th IEEE International Conference on Machine Learning and Applications (ICMLA), Detroit, MI, Dec. 2014. C3. Britton Wolfe, Karim Elish, and Danfeng Yao, Comprehensive Behavior Profiling for Proactive Android Malware Detection. In proceedings of the 17th International Information Security Conference (ISC), Hong Kong, Oct. 2014. C4. Karim Elish, Yipan Deng, Danfeng Yao, and Dennis Kafura, Device-Based Isolation for Securing Cryptographic Keys. In proceedings of the 3rd International Symposium on Internet of Ubiquitous and Pervasive Things (IUPT), Procedia Computer Science (Elsevier), Halifax, Canada, June 2013. C5. Karim Elish, Danfeng Yao, and Barbara Ryder, User-Centric Dependence Analysis for Identifying Malicious Mobile Apps. In proceedings of the IEEE Mobile Security Technologies Workshop (MoST), in conjunction with the IEEE Symposium on Security and Privacy, San Francisco, CA. May 2012. C6. Karim Elish and Mohammad Alshayeb, Investigating the Effect of Refactoring on Software Testing Effort. In proceedings of the 16th IEEE Asia-Pacific Software Engineering Conference (APSEC), Penang, Malaysia, Dec. 2009. C7. Mahmoud Elish and Karim Elish, Application of TreeNet in Predicting Object-Oriented Software Maintainability: A Comparative Study. In proceedings of the 13th IEEE European Conference on Software Maintenance and Reengineering (CSMR), Kaiserslautern, Germany, March 2009. TECHNICAL REPORTS T1. Karim Elish, Danfeng Yao, Barbara Ryder, and Xuxian Jiang, A Static Assurance Analysis of Android Applications. Technical Report TR-13-03, Computer Science, Virginia Tech, 2013. T2. Karim Elish, Yipan Deng, Danfeng Yao, and Dennis Kafura, Device-Based Isolation for Securing Cryptographic Keys. Technical Report TR-12-21, Computer Science, Virginia Tech, 2012. 3
POSTERS AND FORMAL PRESENTATIONS POSTERS 1. Karim Elish, Danfeng Yao, and Barbara Ryder, Inter-Component and Inter-App Communication Analysis in Android for Malware Detection. 9 th Showcase of the Security and Software Engineering Research Center (S 2 ERC), Washington DC, May 2014. 2. Karim Elish, Danfeng Yao, Barbara Ryder, User-Intention Based Program Analysis for Android Security. 2 nd Annual Graduate Student Poster Showcase, Computer Science Department, Virginia Tech, April. 2014. (Best Poster Award) 3. Karim Elish, Danfeng Yao, Barbara Ryder, and Xuxian Jiang, User-Intention Based Android Malware Detection. 22 nd USENIX Security Symposium, Washington DC, Aug. 2013. 4. Karim Elish, Yipan Deng, and Danfeng Yao, and Dennis Kafura, DataGuard: A Mobile System for Securing Ultra-Sensitive Information. 28 th Annual Graduate Research Symposium, Virginia Tech, March 2012. (1 st Place Poster Award) 5. Karim Elish, Danfeng Yao, and Barbara Ryder, User-Centric Dependence Analysis in Programs for Identifying Malware. 4 th Showcase of the Security and Software Engineering Research Center (S 2 ERC), Iowa State University, Iowa, Nov. 2011. FORMAL PRESENTATIONS On the Need of Precise Inter-App ICC Classification for Detecting Android Malware Collusions, IEEE Mobile Security Technologies Workshop (MoST), in conjunction with the IEEE Symposium on Security and Privacy, San Jose, CA. May 2015. User-Intention Based Program Analysis for Android Security, University of Michigan, May 2015. User-Intention Based Program Analysis for Android Security, Florida Atlantic University, April. 2015. Profiling User-Trigger Dependence for Android Security, University of Alabama, Tuscaloosa, Feb. 2015. User-Intention Based Program Analysis for Android Security, Indiana University-Purdue University, March 2015. Profiling User-Trigger Dependence for Android Security, University of North Carolina at Charlotte, Feb. 2015. Role-Playing Game for Studying User Behaviors in Security: A Case Study on Email Secrecy, 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (COLLABORATECOM), Miami, FL, Oct. 2014. Advanced Dependence Analysis for Android Malware Classification, 9 th Showcase of the Security and Software Engineering Research Center (S 2 ERC), an NSF Industry/University Cooperative Research Center, Georgetown University, Washington DC, May 2014. User-Intention Based Android Malware Detection, VeriSign Labs, Reston, VA, August 2013. User-Centric Dependence Analysis in Programs for Identifying Malware, 5 th Showcase of the Security and Software Engineering Research Center (S 2 ERC), Arlington, VA, May 2012. User-Centric Dependence Analysis for Identifying Malicious Mobile Apps, IEEE Mobile Security Technologies Workshop (MoST), in conjunction with the IEEE Symposium on Security and Privacy, San Francisco, CA. May 2012. 4
PROFESSIONAL ACTIVITIES Reviewer IEEE Transactions on Dependable and Secure Computing (TDSC) IEEE Systems Journal Kuwait Journal of Science & Engineering International Journal of Software Engineering and Knowledge Engineering Journal of Computer Science and Technology (An International Journal), Springer External reviewer 22nd ACM Conference on Computer and Communications Security (CCS 15) 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 15) 5th ACM Conference on Data and Application Security and Privacy (CODASPY 15) 31st Annual Computer Security Applications Conference (ACSAC 15) 21st ACM Conference on Computer and Communications Security (CCS 14) 30th Annual Computer Security Applications Conference (ACSAC 14) 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 14) 10th International Conference on Information Security and Cryptology (Inscrypt 14) 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 13) 16th Information Security Conference (ISC 13) 3rd ACM Conference on Data and Application Security and Privacy (CODASPY 13) IEEE Conference on Communications and Network Security (CNS 13) 8th Int l Conference on Security and Privacy in Communication Networks (SecureComm 12) 10th Int l Conference on Applied Cryptography and Network Security (ACNS 12) IEEE Global Communications Conference (GLOBECOM 11) Program committee International workshop on Mobile Computing Security (MCS), 2015 Editorial board member for Journal of Scientific and Engineering Research, Apr. 14 - present Member, Phi Beta Delta Honor Society for International Scholars, since 2014 Member, Upsilon Pi Epsilon (UPE) Honor Society, since 2011 Member, Golden Key International Honor Society, since 2010 UNIVERSITY SERVICE AND VOLUNTEER WORK Research committee, IPFW Faculty Advisor, ACM Programming Competition Faculty Advisor, Mobile Application Development Club, IPFW Undergraduate curriculum committee for ABET evaluations, IPFW High school programming challenges and problem solving competition committee, IPFW Composite Chair, Upsilon Pi Epsilon (UPE), Virginia Tech 2011-2012 Webmaster and Advertisement Officer, Egypt Friends Organization @ Virginia Tech 2011 Webmaster and Tech Chair, Golden Key International Honor Society, Virginia Tech 2011 Software Engineering program committee, ICS Department, KFUPM 2008-2009 Software Engineering program ABET accreditation committee, KFUPM 2008-2009 5